Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 04:02
Behavioral task
behavioral1
Sample
02a66b91fb3ad2250501ae2a1b8cddd6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
02a66b91fb3ad2250501ae2a1b8cddd6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02a66b91fb3ad2250501ae2a1b8cddd6_JaffaCakes118.exe
-
Size
72KB
-
MD5
02a66b91fb3ad2250501ae2a1b8cddd6
-
SHA1
15f45e7c88cda99cdabc878e2c4fc6fda29cf096
-
SHA256
606dcb6d4f9744c500e6761d9f8dd4fe0661bb0703b6200adacf0553505244a8
-
SHA512
00eea5eccd2c0250419a8b4585a0e49f71b84725f368461bf4911efc9be180f8456a65d2b9625d9af29c047d6aae7d6707752f863f2575d7949c627e17b1530d
-
SSDEEP
1536:I+rMOC0RwUuX4NIwdRxJyXGYLMb+KR0Nc8Qs:jriX/8D0X9e0Nc8Qs
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
172.16.149.1:40
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-0-0x0000000000590000-0x0000000000591000-memory.dmpFilesize
4KB